162 research outputs found

    On Supervisor Synthesis via Active Automata Learning

    Get PDF
    Our society\u27s reliance on computer-controlled systems is rapidly growing. Such systems are found in various devices, ranging from simple light switches to safety-critical systems like autonomous vehicles. In the context of safety-critical systems, safety and correctness are of utmost importance. Faults and errors could have catastrophic consequences. Thus, there is a need for rigorous methodologies that help provide guarantees of safety and correctness. Supervisor synthesis, the concept of being able to mathematically synthesize a supervisor that ensures that the closed-loop system behaves in accordance with known requirements, can indeed help.This thesis introduces supervisor learning, an approach to help automate the learning of supervisors in the absence of plant models. Traditionally, supervisor synthesis makes use of plant models and specification models to obtain a supervisor. Industrial adoption of this method is limited due to, among other things, the difficulty in obtaining usable plant models. Manually creating these plant models is an error-prone and time-consuming process. Thus, supervisor learning intends to improve the industrial adoption of supervisory control by automating the process of generating supervisors in the absence of plant models.The idea here is to learn a supervisor for the system under learning (SUL) by active interaction and experimentation. To this end, we present two algorithms, SupL*, and MSL, that directly learn supervisors when provided with a simulator of the SUL and its corresponding specifications. SupL* is a language-based learner that learns one supervisor for the entire system. MSL, on the other hand, learns a modular supervisor, that is, several smaller supervisors, one for each specification. Additionally, a third algorithm, MPL, is introduced for learning a modular plant model.The approach is realized in the tool MIDES and has been used to learn supervisors in a virtual manufacturing setting for the Machine Buffer Machine example, as well as learning a model of the Lateral State Manager, a sub-component of a self-driving car. These case studies show the feasibility and applicability of the proposed approach, in addition to helping identify future directions for research

    Reachability games and related matrix and word problems

    Get PDF
    In this thesis, we study different two-player zero-sum games, where one player, called Eve, has a reachability objective (i.e., aims to reach a particular configuration) and the other, called Adam, has a safety objective (i.e., aims to avoid the configuration). We study a general class of games, called Attacker-Defender games, where the computational environment can vary from as simple as the integer line to n-dimensional topological braids. Similarly, the moves themselves can be simple vector addition or linear transformations defined by matrices. The main computational problem is to decide whether Eve has a winning strategy to reach the target configuration from the initial configuration, or whether the dual holds, that is, whether Adam can ensure that the target is never reached. The notion of a winning strategy is widely used in game semantics and its existence means that the player can ensure that his or her winning conditions are met, regardless of the actions of the opponent. It general, games provide a powerful framework to model and analyse interactive processes with uncontrollable adversaries. We formulated several Attacker-Defender games played on different mathematical domains with different transformations (moves), and identified classes of games, where the checking for existence of a winning strategy is undecidable. In other classes, where the problem is decidable, we established their computational complexity. In the thesis, we investigate four classes of games where determining the winner is undecidable: word games, where the players' moves are words over a group alphabet together with integer weights or where the moves are pairs of words over group alphabets; matrix games on vectors, where players transform a three-dimensional vector by linear transformations defined by 3×3 integer matrices; braid games, where players braid and unbraid a given braid; and last, but not least, games played on two-dimensional Z-VAS, closing the gap between decidable and undecidable cases and answering an existing open problem of the field. We also identified decidable fragments, such as word games, where the moves are over a single group alphabet, games on one-dimensional Z-VASS. For word games, we provide an upper-bound of EXPTIME , while for games on Z-VASS, tight bounds of EXPTIME-complete or EXPSPACE-complete, depending on the state structure. We also investigate single-player systems such as polynomial iteration and identity problem in matrix semigroups. We show that the reachability problem for polynomial iteration is PSPACE-complete while the identity problem for the Heisenberg group is in PTIME for dimension three and in EXPTIME for higher dimensions

    A hybrid intrusion detection system

    Get PDF
    Anomaly intrusion detection normally has high false alarm rates, and a high volume of false alarms will prevent system administrators identifying the real attacks. Machine learning methods provide an effective way to decrease the false alarm rate and improve the detection rate of anomaly intrusion detection. In this research, we propose a novel approach using kernel methods and Support Vector Machine (SVM) for improving anomaly intrusion detectors\u27 accuracy. Two kernels, STIDE kernel and Markov Chain kernel, are developed specially for intrusion detection applications. The experiments show the STIDE and Markov Chain kernel based two class SVM anomaly detectors have better accuracy rate than the original STIDE and Markov Chain anomaly detectors.;Generally, anomaly intrusion detection approaches build normal profiles from labeled training data. However, labeled training data for intrusion detection is expensive and not easy to obtain. We propose an anomaly detection approach, using STIDE kernel and Markov Chain kernel based one class SVM, that does not need labeled training data. To further increase the detection rate and lower the false alarm rate, an approach of integrating specification based intrusion detection with anomaly intrusion detection is also proposed.;This research also establish a platform which generates automatically both misuse and anomaly intrusion detection software agents. In our method, a SIFT representing an intrusion is automatically converted to a Colored Petri Net (CPNs) representing an intrusion detection template, subsequently, the CPN is compiled into code for misuse intrusion detection software agents using a compiler and dynamically loaded and launched for misuse intrusion detection. On the other hand, a model representing a normal profile is automatically generated from training data, subsequently, an anomaly intrusion detection agent which carries this model is generated and launched for anomaly intrusion detection. By engaging both misuse and anomaly intrusion detection agents, our system can detect known attacks as well as novel unknown attacks
    corecore